5.3
CVSSv3

CVE-2015-2060

Published: 29/11/2019 Updated: 26/04/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

cabextract prior to 1.6 does not properly check for leading slashes when extracting files, which allows remote malicious users to conduct absolute directory traversal attacks via a malformed UTF-8 character that is changed to a UTF-8 encoded slash.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cabextract_project cabextract

Vendor Advisories

Debian Bug report logs - #778753 cabextract: CVE-2015-2060: Directory traversal Package: cabextract; Maintainer for cabextract is Eric Sharkey <sharkey@debianorg>; Source for cabextract is src:cabextract (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Thu, 19 Feb 2015 10:45:01 UTC Sever ...